• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. protectaccount

    Course Complete WIFI Hacking Course With Powerful MITM Techniques

    Welcome to the best WIFI hacking course ever. Before beginning WIFI Hacking, I will teach you super powerful social engineering techniques to steal WIFI passwords. I will teach you how to create an automated batch script for steal saved passwords and compiling them into undetectable and...
  2. COMRAE911

    Re-directin' HTTPS requests tae yer webserver ower the network wi' Bettercap - MiTM

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. snake__security

    Redirect to the Attack Landin' Page - BeEF / MiTM

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. snake__security

    Malware and Ransomware Delivery - MiTM Attack

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. snake__security

    Malware and Ransomware Delivery - MiTM Attack

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. reduser72

    Login:Pass bettercap Network Attack & MITM Framework

    Flexible MITM tool for traffic manipulation, credential harvesting and protocol fuzzing. What it does: ARP/DNS spoofing, HTTP/HTTPS interception & tampering. Module ecosystem for credential capture & plugins. Useful for network-level red-team scenarios.
  7. Legend@

    Malware and Ransomware Delivery - MiTM Attack

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. Legend@

    How to Execute MitM Attacks

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. muuaz324

    Udemy - ARP Spoofing And MITM Attacks

    Download Link : https://mega.nz/file/5TNWGQRJ#rF753MqDBBzPdQK7h8fc6_W7OnxXVIHpBkUQaCFuoOY Pasword : @Codex
  10. tronny

    iSecur1ty - ARP spoofing & MITM Attacks

    iSecur1ty - ARP spoofing & MITM Attacks *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. m4guy

    Network Basics for Hackers by OTW (1K access)

    Link: https://send.exploit.in/download/dcce2a86fd797d61/#lPwK5KS2IULwSHqgFjD15Q *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. SPKRFRQR

    Hands-On Penetration Testing with Kali NetHunter

    Hands-On Penetration Testing with Kali NetHunter by Glen D. Singh & Sean-Philip Oriyano :ban: LEAVE A LIKE. DON'T BE A LEECH. :ban: ::: l i n k ::: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** :ban: LEAVE A LIKE. DON'T BE A LEECH...
  13. 074c1ef2ab9dc40fbeef

    Intercept LAN Traffic via Arp Spoofing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. majk

    PETEP: TCP/UDP proxy alternative to Burp/Zaproxy (free, open-source)

    PETEP (PEnetration TEsting Proxy) GitHub: https://github.com/Warxim/petep Website: https://petep.warxim.com/ PETEP is an open-source TCP/UDP Proxy with support for modifying the transmitted data in graphical interface manually or using automatic rules. PETEP has multiple features including...
Top Bottom